Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
de6ae8b89fb345d1a8dcc3b1b84d3d1c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de6ae8b89fb345d1a8dcc3b1b84d3d1c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
de6ae8b89fb345d1a8dcc3b1b84d3d1c_JaffaCakes118.html
-
Size
27KB
-
MD5
de6ae8b89fb345d1a8dcc3b1b84d3d1c
-
SHA1
bc7ae8056b2e8a0237ec435d0c050b0b992537e5
-
SHA256
ca157b3ce069dcec9aeadaec11371a75a1dae843088964bffd8b341605d67a8b
-
SHA512
daf6cbf628ba96f8f558eacd8920e43894c114284989f0d5de54d68bed3c24b84d23b83e5fa357a81b6c80e0b23d20a91974369ff9da07c8ab315ac781d26ef2
-
SSDEEP
384:SEQTziZX0B2LHsRQWp3lselGlfCnqGrAyuVTcUBSW1eITj0N73XgUzRJKzOKoBA0:SNTzz5cSrAnBY0QLGe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 3640 msedge.exe 3640 msedge.exe 4104 identity_helper.exe 4104 identity_helper.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3640 wrote to memory of 2200 3640 msedge.exe 84 PID 3640 wrote to memory of 2200 3640 msedge.exe 84 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4464 3640 msedge.exe 85 PID 3640 wrote to memory of 4788 3640 msedge.exe 86 PID 3640 wrote to memory of 4788 3640 msedge.exe 86 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87 PID 3640 wrote to memory of 3920 3640 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\de6ae8b89fb345d1a8dcc3b1b84d3d1c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c1fd46f8,0x7ff8c1fd4708,0x7ff8c1fd47182⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16864335357320806838,7411580334875683608,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,16864335357320806838,7411580334875683608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,16864335357320806838,7411580334875683608,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16864335357320806838,7411580334875683608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16864335357320806838,7411580334875683608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16864335357320806838,7411580334875683608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16864335357320806838,7411580334875683608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16864335357320806838,7411580334875683608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16864335357320806838,7411580334875683608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16864335357320806838,7411580334875683608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16864335357320806838,7411580334875683608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16864335357320806838,7411580334875683608,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
6KB
MD503542df53e8c4d56138c084f707bc57c
SHA15cc338c1d56cf368f58b53c57d30f7200a529bbc
SHA256aa44d3a250de9d17f2705fc83fa979b0430779e11958eefebdff555dc648f705
SHA5127d00b37fabbc6ff3c0b444695c55e5860a3a83906815a34d002c4a0c4c5e924f44aa2b530c0ba6f8d7adc157935192916e5a7dc9395a701e92c5c31e85dc3a27
-
Filesize
6KB
MD56ae7c7dbb8b2a68755b54f8f077c7375
SHA1f4cdbd304ebfd4108fe7bf9568e3843f7973c3b9
SHA256715864ee7188067c0f943a9549e3df1aa4192a89004aee81893b30b3f28147fc
SHA51273320cdf43a5b9d1b483e967c4452cf3a15dd3e8808047aaa39ede391a6663153767c901ca6617b6671f792208dbec31d923cea536b2ce7e21419641ffb12321
-
Filesize
6KB
MD5ef67c7fd08332c660982d918365fe39b
SHA1d9eda0c1d07e790e48d5f6266d2d3a2154bf5fee
SHA256dec52a736c94c6674ace9aaa1e18b5abb40582b4e9e993c8fcd537f1052ff67a
SHA5121aed4b4bfb54f901a8b934e18473a96adc46894b1c623a1e0325fec156da9171e4c0101e8471a51394e77fc581a10897be1bce2517f8b75d6af961967f17f771
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD548ca63d688ce590e7e801d6456bfe198
SHA18bb8d8a317c0aa022de676f3b071b253a96d4713
SHA2569aae70eed54ad7c4e65fd626351588a6f4f3aed9eb466d885511fab94ebe87dd
SHA512cbc7ab5da9e3d992e353fc5aca4b7be5371109574bce6e6801c00badfa87ad25e9f0778b511136996ac08cfe9155f0023013acfa7ef56676f242c721827cf7d1